Internet of things is a emerging field due to technology upgradation through artificial intelligence.
- IOT is the interconnection of devices globally through Internet connection.
- Due to IOT advancements in technology, cyber security plays a major role for merits to secure.
- For example for IOT, we can say RFID to track devices. And day to day use of small control through remote devices.
- IOT homes are starting point, so education is only important for Internet of things. Currently due to IOT light bulbs, Camera, thermostat are currently connecting to Internet.
Camera connected to Internet:
- Whenever camera is connected using intercept key, hacker can see the key. So secure your wireless network
- Web camera can be hacked based on Virus send as an attachment.
- Advanced robots technology is important for security bounty hunters.
Smart Medicine Bottle:
- Tracks number of pills in the bottle.
- Reports changes in quantity.
- Remember data and time of pills taken.
- HIPPA-health insurance portability accountability act.
- Activate remote wiping of applications, whenever your device lost we can do that.
- Drones are Internet connected, currently there are 5 lakhs of drones sold this year.
The Cyber security Techniques:
- Cryptography
- Intrusion detection
- Multifactor authentication
Cryptography:
Cryptography is a mathematics to change data which is unreadable, only recipient have the key.
Multifactor Authentication - MFA:
MFA is a input two different forms of data to access data on Internet.
Biometric Identification:
- Finger Print
- Voice Recognition
- Face recognition
IDS:Intrusion Detection System:
IDS is used to detect the external threat. People try to access data from external in that may be a chance of external threat.
IDS is used to detect the external threat. People try to access data from external in that may be a chance of external threat.
Internal intrusion:
- Internal intrusion is someone within a company or somebody trying to sabotage company data.
- Peoples careless with software while installing allowing access to third party are route for the attack.
- Use strong password so password cannot be compromised by dictionary attack.
- We can predict easily 50 billion devices connecting to Internet in the next 5 years.
- Protecting privacy will continue to challenge IOT at lightning speed.
Hill Station view:
https://valparaihillsheaven.blogspot.com/2019/?m=1
How to secure devices from cyber threats:
Https://viruscmd.blogspot.com
How to secure devices from cyber threats:
Https://viruscmd.blogspot.com